You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
variable "fwCommonUserName" {
description = "The common firewall username."
}
It appears that the plugin is putting the message in the value when there is a problem. It would be more helpful to return the value as null so that one can use tf input variable validation to determine if one should go on without the secret.
My results:
when doing ts up I get the message "WARN: Vault not found " on stdout and tf tries to replace the resource
module.spokeNetwork["sharedServices"].module.spokeNetworkInstance["web"].azurerm_windows_virtual_machine.vm_spoke_instance must be replaced
similar to 1. but the message is "WARN: Operation get is not allowed on a disabled secret." and it tries to replace the resource
module.fwPaloAltoTransitCommon01.azurerm_linux_virtual_machine.vm_firewall must be replaced
-/+ resource "azurerm_linux_virtual_machine" "vm_firewall" {
~ admin_username = "vmadmin" -> "Operation get is not allowed on a disabled secret." # forces replacement
similar to 1. and 2. but the message is "WARN: A secret with (name/id) fwCommonUserNames was not found in this key vault. If you recently deleted this secret you may be able to recover it using the correct recovery command. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125182" and it tries to replace the resource
module.fwPaloAltoTransitCommon01.azurerm_linux_virtual_machine.vm_firewall must be replaced
-/+ resource "azurerm_linux_virtual_machine" "vm_firewall" {
~ admin_username = "vmadmin" -> "A secret with (name/id) fwCommonUserNames was not found in this key vault. If you recently deleted this secret you may be able to recover it using the correct recovery command. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125182" # forces replacement
same message as 3. and it tries to replace the resource
5 and 6. the start and expiration dates are ignored. the resource gets created/modified as usual.
The text was updated successfully, but these errors were encountered:
Testing the use of azure key vault secrets and running into a few issues. These are the scenarios I am testing:
I have all my kv values in base.tfvars and refrence them in variables.tf
fwCommonUserName = "<%= azure_secret("fwCommonUserName") %>"
variable "fwCommonUserName" {
description = "The common firewall username."
}
It appears that the plugin is putting the message in the value when there is a problem. It would be more helpful to return the value as null so that one can use tf input variable validation to determine if one should go on without the secret.
My results:
module.spokeNetwork["sharedServices"].module.spokeNetworkInstance["web"].azurerm_windows_virtual_machine.vm_spoke_instance must be replaced
-/+ resource "azurerm_windows_virtual_machine" "vm_spoke_instance" {
~ admin_password = (sensitive value)
~ admin_username = "vmadmin" -> "WARN: Vault not found " # forces replacement
module.fwPaloAltoTransitCommon01.azurerm_linux_virtual_machine.vm_firewall must be replaced
-/+ resource "azurerm_linux_virtual_machine" "vm_firewall" {
~ admin_username = "vmadmin" -> "Operation get is not allowed on a disabled secret." # forces replacement
module.fwPaloAltoTransitCommon01.azurerm_linux_virtual_machine.vm_firewall must be replaced
-/+ resource "azurerm_linux_virtual_machine" "vm_firewall" {
~ admin_username = "vmadmin" -> "A secret with (name/id) fwCommonUserNames was not found in this key vault. If you recently deleted this secret you may be able to recover it using the correct recovery command. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125182" # forces replacement
5 and 6. the start and expiration dates are ignored. the resource gets created/modified as usual.
The text was updated successfully, but these errors were encountered: